Contact IT Masters
Enrolments: 196,082

Master Degree and Graduate Certificate Course Enrolments: 7,138

The total number of Master degree and Graduate Certificate enrolments since Charles Sturt University and IT Masters launched our first qualification in 2003.

Short Course Enrolments: 188,944

The total number of enrolments in our free short courses that we offer as a ‘taster’ of what it is like to study via Distance Education with Charles Sturt University.

Graduate Certificate in Cloud Computing and Virtualisation

Duration
8 months part-time
Intakes
Three sessions a year
Study mode
Online
Units of Study
4 subjects

Course Details

What is this course about?

The aim of the Graduate Certificate in Cloud Computing and Virtualisation is to provide computing professionals with a comprehensive overview of the theoretical and technical aspects of cloud and virtualisation technologies and their use within a business context. The course also provides a pathway to Masters level study in the fields of networking, cloud computing and virtualisation.

Upon completion of this course, graduates will be able to:

  • demonstrate and apply knowledge of current trends in areas such as network administration, cloud computing, virtualisation, and networking architectures;
  • investigate and critically reflect on emerging IT networking developments, particularly those that relate to cloud computing and virtualisation;
  • apply appropriate technical skills and critical thinking techniques to solve complex computer networking problems within a business context;
  • pursue further study within the computer networking, cloud computing and virtualisation discipline areas. 

Subjects

Elective Academic Subjects (Choose 2)
ITC513
Wireless Networking Concepts
ITC514
Linux Server Administration
ITC540
IT Infrastructure Management
ITC542
Internetworking with TCP/IP

Abstract

This subject provides a broad survey of wireless communications including in-depth coverage of protocols, transmission methods, and different contemporary wireless networking standards. It also provides students with experience in current and emerging wireless communication technologies.

ITC513 - Wireless Networking Concepts will cover the following topics:

  • Wireless signals and spectrum.
  • Radio systems and standards.
  • Antennas and propagation.
  • Wireless personal area networks.
  • Wireless local area networks.
  • Wireless metropolitan area networks.
  • Wireless wide area networks.
  • Wireless network security.
  • Wireless communications in business.

Assessment

  1. Online quiz (5 quizzes - 15%)
  2. Assessment 1 (4 questions - 16%)
  3. Assessment 3 (3 questions - 19%)
  4. Final Exam (50%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject is designed to introduce students to systems administration of Linux servers that provide information services accessed through the internet. Students learn to operate servers via the command line, write scripts to automate management tasks, create and manage networked information services, and assess tools for improving data and service protection.

ITC514 - Linux Server Administration will cover the following topics:

  • Introduction to server administration
  • Automating system tasks
  • Data organisation
  • Data Integrity
  • Network administration
  • Network services
  • UNIX security
  • Performance analysis
  • Security management, policy and politics

Assessment

  1. Installing  Linux (10%)
  2. Assignment 2 (Quiz and practical task - 20%)
  3. Assignment 3 (Quiz and practical task - 20%)
  4. Final Exam (50%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject will employ a research, reporting and presentation approach using the latest ICT tools to examine and critically analyse a combination of the technical and management issues in contemporary infrastructure management, with a focus on business alignment. IT infrastructure Management evaluates new ICTs and case studies in the context of enterprise architecture. It is suitable for combinations of students in information technology, business administration and electronic commerce.

ITC540 - IT Infrastructure Management will cover the following topics:

  • Information systems.
  • IT infrastructure and support systems.
  • Data, text, and document management.
  • Network management and mobility.
  • Security, crime, compliance, and continuity.
  • E-business and e-commerce.
  • Mobile computing and commerce.
  • Web 2.0 and social media.
  • Operational planning and control systems.
  • Enterprise information systems.
  • Business intelligence and decision support.
  • IT strategic planning.

Assessment

  1. Assignment 1 (500 words - 3%)
  2. Assignment 2 (5 questions - 15%) 
  3. Assignment 3 (3 tasks - 32%)
  4. Final Exam (50%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject is about the TCP/IP protocol suite and how it is used on the internet. It begins with a short history of the internet, the organisations that develop internet standards, and a review of the underlying communications technologies needed for the internet. Detailed examinations of IP addressing, IP routing, as well as the internet layers and protocols are then facilitated. Finally internet applications, IPv6, and the future of TCP/IP are discussed.

ITC542 - Internetworking with TCP/IP will cover the following topics:

  • History of the internet and standards organisations.
  • TCP/IP and ISO OSI networking architecture.
  • Underlying technologies.
  • IP addressing.
  • Internetworking protocols.
  • Routing protocols.
  • Address and name management.
  • Application-layer protocols.
  • Future of the internet.

Assessment

  1. Discussion Posts (10%)
  2. Research Report (1800 words - 15%)
  3. Research Network Design (25%)
  4. Final Exam (50%)

Subject Availability

Session 1 (Feb), Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITC558
Programming Principles
ITC560
Internet of Things
ITC561
Cloud Computing
ITC568
Cloud Privacy and Security

Abstract

This subject introduces students to the programming process. It begins with the development of problem solving skills relevant to the solution of programming problems. This subject is one of the foundation subjects for other studies in information technology because it develops skills, techniques and approaches that underpin many other areas of the discipline of computing.

ITC558 - Programming Principles will cover the following topics:

  • The major steps in the programming process.
  • Techniques for analysing programming problems.
  • Variables and expressions.
  • Control structures of sequence, selection, and iteration.
  • Designing appropriate test data.
  • Introduction to object orientation.
  • Debugging techniques.
  • Programming languages and their application areas.

Assessment

  1. Weekly topic quizzes(10 quizzes - 10%)
  2. Assignment 1 (Programming exercise - 10%)
  3. Assignment 2 (Programming exercise - 15%)
  4. Assignment 3 (Programming exercise - 15%)
  5. Final Exam (50%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides a broad study of various latest internet technologies and underlying communication technologies used in the Internet of Things (IoT). The main emphasis is to combine technical concepts with a high-level understanding of IoT networks and communication media used in the IoT. The subject provides a comprehensive understanding of the Internet of Things and explores topics such as IoT architecture, IoT communication protocols, security in IoT and IoT applications in the modern world. The subject also examines business use-cases of IoT in real-world environments such as industrial and home automation.

ITC560 - Internet of Things will cover the following topics:

  • Introduction and overview of IoT.
  • IoT and web of things.
  • IoT architecture.
  • IoT building blocks.
  • IoT communication protocols.
  • Security in IoT.
  • IoT applications and business use-cases.

Assessment

  1. IoT Exploration(10%)
  2. Short Answer Questions (16%)
  3. IoT at Home (19%)
  4. Final Exam (55%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides students with an in-depth study of cloud computing technologies and their use in business. It looks into various standards based cloud systems and architectures. It further discusses various cloud delivery models, planning for migration to a cloud model. It also discusses governance and security issues in a cloud model and managing the cloud infrastructure.

ITC561 - Cloud Computing will cover the following topics:

  • Fundamentals of Cloud Computing.
  • Cloud Architectures.
  • Cloud Delivery Models.
  • Cloud Risk Management.
  • Cloud Security.
  • Planning a migration to the Cloud.
  • Cloud Governance and Management.
  • Managing the Cloud Infrastructure.

Assessment

  1. Online quiz (5%)
  2. Concepts and Models (20%)
  3. Security Management and Migration (25%)
  4. Final Exam (40%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.

ITC568 - Cloud Privacy and Security will cover the following topics:

  • Governance and auditing for cloud operations.
  • Threats, risk and requirements landscape.
  • Privacy, data and digital identity.
  • Data sensitivity, location and legal jurisdiction.
  • Cloud security approaches and challenges.

Assessment

  1. Privacy and Security Reflection (3000 words - 10%)
  2. Risk Assessment (25%)
  3. Privacy and Data Protection (30%)
  4. PII Strategy (35%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITC572
Software Defined Networks
ITC593
Network Security
ITC595
Information Security

Abstract

This subject introduces Software Defined Networking (SDN), an emerging and innovative networking paradigm. SDN allows the management and control of the behavior of networks through centralized software. The subject will cover the fundamentals of SDN such as architecture, abstractions of layers in terms of control and data plane, and use-cases and applications. In particular, this subject will address the concept of separating the network’s control plane from the underlying data plane such as physical routers and switches responsible for forwarding the actual traffic. In addition, it will look at how network operators can become more flexible in their management of complex and disjointed network functions, including routing, traffic engineering, resource control and security. Hands on practice and application will be provided to students, preparing them for real world SDN implementation.

ITC572 - Software Defined Networks will cover the following topics:

  • Introduction to SDN (A paradigm shift in networking).
  • Abstraction of layers in terms of control plane and data plane.
  • Network Function Virtualization (NFV).
  • Open Flow Concept and Implementation.
  • SDN Controllers.
  • Programming SDNs.
  • SDN Applications through use cases.
  • Hands on Labs on SDN.

Assessment

  1. Quiz (15%)
  2. Research Based Project (20%)
  3. SDN Hands on Labs (15%)
  4. Final Exam (50%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

ITC593 provides a practical survey of network security protocols and standards, along with an in-depth introduction to the field of cryptography. ITC593 explores how digital signatures, encryption algorithms, and hash functions are used to satisfy various security goals, such as authentication, confidentiality, and integrity. ITC593 also includes a comprehensive coverage of two important network security services, Kerberos and PKI (Public Key Infrastructure).

ITC593 - Network Security will cover the following topics:

  • Introduction to computer and network security.
  • Introduction to cryptography.
  • Secret key (symmetric) algorithms.
  • Modes of operation.
  • Public key (asymmetric) algorithms.
  • Number theory.
  • Authentication systems.
  • User authentication.
  • Security handshakes.
  • Kerberos.
  • Public key infrastructure (PKI).

Assessment

  1. Assignment 1: Online Quizzes (Five quizzes - 20%)
  2. Assignment 2 (3 tasks - 15%)
  3. Assignment 3 (2 tasks - 15%)
  4. Final Exam (50%)

Subject Availability

Session 2 (July), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides a broad overview of information security concepts, with an emphasis on combating security threats to operating systems, computer programs, databases and networked systems. Students will also study foundational security policies that stipulate requirements about integrity, confidentiality and availability. Techniques for implementing these policies are also investigated, including memory management techniques, access control mechanisms, user authentication, and networking tools.

ITC595 - Information Security will cover the following topics:

  • Overview of computer security.
  • Introduction to cryptography.
  • Malicious code.
  • Operating systems security.
  • Access Control Theory.
  • Trusted operating systems.
  • User authentication.
  • Security policies and models.
  • Networking threats.
  • Networking controls.
  • Database and data security.

Assessment

  1. Online quiz (5 quizzes - 10%)
  2. Research Report task (1800 words - 20%)
  3. Research Project (20%)
  4. Final Exam (50%)

Subject Availability

Session 1 (Feb), Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
Elective Industry Subjects (Choose 2 from)
ITE508
Mobile Data Architecture
ITE512
Incident Response
ITE513
Forensic Investigation
ITE514
Professional Systems Security

Abstract

This subject gives students advanced skills in designing, developing and deploying Web applications with Microsoft Visual Studio and Microsoft SQL Server. Students will learn the fundamentals of Model View Controller (MVC) design and multi tier architecture. Emphasis is placed on creating web based server data stores able to be remotely accessed via multiple platforms. Students will design and build a database, an API, and a Web application. They will ensure quality by debugging, unit testing, and refactoring of their application.

ITE508 - Mobile Data Architecture will cover the following topics:

  • Overview of Web Application design
  • Designing and evaluating a Web application
  • Designing for Multiple Tiers
  • MVC and MVVM design
  • Designing for Load and Discoverability
  • Database Design and Entity Framework
  • Web API
  • Azure and Cloud Based services
  • Ensuring Quality by Debugging, Unit Testing, and Refactoring
  • Securing a Web Application
  • Source Control Systems (Git, SVN, VSO)
  • Task Management using Agile methodologies
  • Deploying a Web Application

Assessment

  1. Project Name and Summary (SY/US)
  2. Project Status Report (500 words - 30%)
  3. Project Delivery (4000 words - 70%)

Subject Availability

Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

In this subject students will investigate the current threats to systems and networks, along with effective countermeasures. Students will also be prepared for the GIAC Certified Incident Handler (GCIH) industry certification exam.

ITE512 - Incident Response will cover the following topics:

  • Computer attack methods
  • Computer attack vectors
  • Defence methods
  • Computer scanning
  • Platform and device-specific attacks and defences
  • Application-level attacks and defences
  • Incident handling processes
  • Legal issues
  • Recovery and restoration issues

Assessment

  1. Incident Response Plan (2500 words - 30%)
  2. Incident Report (2500 words - 30%)
  3. Final Exam (40%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

In this subject students will acquire an in-depth knowledge and practical understanding of how to scan, test, hack and secure a computer system against potential vulnerabilities. Students will also be prepared for the Computer Hacking Forensic Investigator (CHFI) industry certification exam from the EC-Council.

ITE513 - Forensic Investigation will cover the following topics:

  • Computer forensic analysis.
  • The latest computer attack vectors and how you can stop them.
  • Proactive and reactive defences for each stage of a computer attack.
  • Investigation of attacks against Windows, Unix, switches, routers and other systems.
  • Application-level vulnerabilities, attacks, and defences.
  • Legal issues in incident handling.
  • Recovering from computer attacks and restoring systems for business.

Assessment

  1. Practical Labs (20%)
  2. Forensic Essay (3500 words - 35%)
  3. Final Exam (45%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

In this subject students will analyse and apply content from the ten domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. Students in this subject will also be prepared for the Certified Information Systems Security Professional (CISSP) industry certification exam from the International Information Systems Security Certification Consortium (ISC²).

ITE514 - Professional Systems Security will cover the following topics:

  • Access Control
  • Application Development Security
  • Business Continuity and Disaster Recovery planning
  • Information Security Risk and Governance
  • Cryptography
  • Legal, Regulations, Investigations and Compliance
  • Operations Security
  • Physical (Environmental) Security
  • Security Architecture and Design
  • Telecommunications Security

Assessment

  1. Access Control Policy (2000 15%)
  2. Incident Analysis (3000 words - 35%)
  3. Final Exam (50%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITE516
Hacking Countermeasures
ITE523
Virtualization
ITE526
Practical Internetworking
ITE527
Server Administration

Abstract

In this subject students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.

ITE516 - Hacking Countermeasures will cover the following topics:

  • Footprinting, Scanning and Enumeration.
  • Penetration Testing, System Hacking, Session Hacking and Linux Hacking.
  • Trojans, Back Doors, Viruses and Worms.
  • Sniffers.
  • Denial of Service.
  • Social Engineering.
  • Hacking networks and exploiting vulnerabilities.
  • SQL Injections.
  • Physical Security.
  • Evading IDS, Firewalls and Honeypots.
  • Buffer Overflows.
  • Cryptography.

Assessment

  1. Lab Task 1 (15%)
  2. Lab Task 2 (15%)
  3. Social Engineering Essay (25%)
  4. Final Exam (45%)

Subject Availability

Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

The subject explores the installation, configuration, and management of VMware virtualization software. The subject will prepare students to take the examination to become a VMware Certified Professional.

ITE523 - Virtualization will cover the following topics:

  • Subject Introduction & Virtualization Introduction
  • Virtual Machines
  • VMware vCenter Server
  • Configuring & Managing Virtual Networks
  • Configuring & Managing Virtual Storage
  • Access & Authentication Control
  • Resource Management & Monitoring
  • High Availability & Fault Tolerance
  • Host Scalability
  • Patch Management
  • Installing VMware vSphere Components

Assessment

  1. Practical Lab Tasks (5 tasks - 20%)
  2. Data Centre Migration & Implementation (40%)
  3. Final Exam (40%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject provides students with a knowledge of fundamental networking concepts and builds the capacity of students to design, evaluate and configure various network components and protocols. Students will also prepare for Cisco industry certification exams during this subject.

ITE526 - Practical Internetworking will cover the following topics:

  • Building a simple network
  • Ethernet Local Area Networks (LAN)
  • Wireless Local Area Networks
  • Exploring the functions of routing
  • Wide Area Networks
  • Network environment management and troubleshooting networks
  • Expanding switched network
  • Routing concepts
  • Access Control Lists
  • Address space management
  • LAN extensions

Assessment

  1. Online quiz (15%)
  2. Internetworking Case Study (5000 words - 40%)
  3. Final Exam (45%)

Subject Availability

Session 1 (Feb)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

The aim of this subject is to enable students to plan, deploy, optimise and maintain Microsoft Servers. Students will learn how to analyse network performance and create an optimisation strategy, design and apply a network security policy, analyse and configure Core Network Services, and design and implement an Active Directory solution. Students will also prepare for Microsoft industry certification exams during this subject.

ITE527 - Server Administration will cover the following topics:

  • Server installation and configuration.
  • Network security Policies.
  • Active Directory.
  • Group Policy.
  • Virtualization.
  • File and print services.
  • Domain Controllers.
  • Network access protection.
  • Audit policies.
  • Service authentication.
  • Network deployment.

Assessment

  1. Online quiz (15%)
  2. Server Administration Handbook (7500 words - 40%)
  3. Final Exam (45%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.
ITE533
Cyber Security Management
ITE531
Architecting Cloud Solutions
ITE532
Containers and Virtualisation
ITI581
Security Fundamentals

Abstract

This subject prepares students for the Certified Information Systems Management Certification (CISM), which is an international industry certification developed by ISACA. Students in this subject will investigate how to establish and maintain an information security governance framework along with the supporting processes to ensure that an organisation's information security strategy is aligned with its goals and objectives.

ITE533 - Cyber Security Management will cover the following topics:

  • Information security governance
  • Information security strategy
  • Security requirements
  • Risk management and compliance
  • Security policies
  • Asset classification models
  • Program development and management
  • Security incident management

Assessment

  1. Threat and Risk Assessment Report (2000-3000 words - 30%)
  2. Information Security Roadmap (12 Slides - 30%)
  3. Final Exam (40%)

Subject Availability

Session 2 (July)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject will help students prepare for the Amazon Web Services (AWS) Certified Solutions Architect industry certification. Students will study important characteristics of a successful cloud-based implementation, including those that relate to scalability, security, reliability, durability, and cost effectiveness. This learning will be applied through the design of an optimal cloud-based system in accordance with a set of project requirements. 

ITE531 - Architecting Cloud Solutions will cover the following topics:

  • Designing cloud-based systems
  • Cloud implementation and deployment
  • Troubleshooting cloud-based systems
  • Project costing
  • Deployment management
  • Network design
  • Data storage
  • Cloud-based security
  • Scalability and elasticity
  • Cloud migration and hybrid architecture

Assessment

  1. Hands-on Lab Exercises (10%)
  2. Scoping document (20%)
  3. Hands-on lab exercises and additional questions (30%)
  4. Architecture and Design exercise (3000 words – 40%)

Subject Availability

Session 2 (July)

Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This subject focuses on container virtualization using open-source technologies that automate the deployment of applications. Students of the subject will create and run their own custom container environment, from the base operating system through to the entire container platform. Students will also study the appropriate use of different container types and how to apply them in a business context.

ITE532 - Containers and Virtualisation will cover the following topics:

  • Container fundamentals
  • Containers versus virtual machines
  • Different container technologies
  • Configuring a container engine
  • Container virtual networking
  • Container orchestration and clustering
  • Images and containers
  • Working with remote repositories
  • Security and isolation
  • Troubleshooting
  • Monitoring and alerting
  • Controlling running containers
  • Containers in a business context

Assessment

TBD - First run 2018

Subject Availability

TBD - First run 2018

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Abstract

This is an industry-based subject that will help students prepare for the Security+ industry qualification which has been developed by the International Computer Technology Industry Association (CompTIA) to demonstrate vendor-neutral IT security knowledge and skills. Students will also be introduced to a broad range of computer security topics that include infrastructure security, communications, cryptography, access control, authentication, external threats, and operational and organisational security. Students will also learn to apply these concepts to protect computing infrastructure from security threats.

ITI581 - Security Fundamentals will cover the following topics:

  • Network security
  • Network design elements and components
  • Compliance and operational security
  • Threats and vulnerabilities
  • Types of attacks
  • Risk mitigation strategies
  • Appropriate security controls
  • Disaster recovery plans and procedures
  • Application, data and host security
  • Access control and identity management
  • Cryptography
  • Intrusion detection systems
  • Preparing for CompTIA Security+ certification

Assessment

  1. Lab Exercises (25%)
  2. Case Study (3000 - 4000 words - 35%)
  3. Final Exam (45%)

Subject Availability

Session 1 (Feb), Session 3 (Nov)

The information above was accurate the time the subject was last run, but may change in future. Be sure to check the details in your subject outline upon enrolment.

Request Subject Outline

Fill out the form below and we will send you a full outline from a recent offering of this subject including the assessments and how the subject was structured.

Note: that if you intend to move into the Master of Cloud Computing and Virtualisation and pursue a specialisation, you must choose subjects within the industry specialisation you intend to follow in the Master’s course. 

Note 2: Assessment items are subject to change. Your official subject assessments should be confirmed in your online Subject Outline upon enrolment in that subject.

Sample Assessments

Sample Assessment

Assessments in your subjects will take a variety of forms, all designed to test and enhance your learning. You might be called upon to sit an exam, write a marketing plan, design an application, produce a video presentation, sit a quiz or any number of tasks. Why not try a small sample based on the exam from the subject ITE514 – Professional Systems Security?

  1. Why is prevention alone NOT enough to deal with attackers?
    1. Because upkeep of preventive measures is labour intensive
    2. Because it is difficult to implement preventive measures
    3. Because prevention alone is an expensive option
    4. Because even the best preventive measures are subject to failure
  2. Which of these choices best describes a buffer overflow attack?
    1. The input data exceeds the memory allocated for it.
    2. A buffer overflow is the common result of a SYN flood attack.
    3. Data formatted differently than expected by the receiving process.
    4. There is insufficient input data to fill the programs memory buffer.
  3. In a /24 subnet, the address x.x.x.255 BEST represents which of the following?
    1. An unusable address
    2. A broadcast address
    3. A standard IP address
    4. A network address
  4. What is NOT a method of social engineering?
    1. Impersonating a corporate VP over the phone
    2. Sending an e-mail that persuades a user to open a dangerous attachment
    3. Dumpster diving for sensitive corporate information
    4. Sending a popup window asking the user to re-authenticate
  5. Which of the following characterizes UDP as compared to TCP?
    1. More complex
    2. Connection oriented
    3. Faster
    4. Guaranteed delivery
  6. What specific action did the Melissa virus take that caused it to spread so fast?
    1. It broadcast itself to remote hosts with a spoofed address, echoing it to machines all over the Internet.
    2. It mailed itself to the first 50 entries in a victim’s Microsoft Outlook address book.
    3. It invaded root DNS servers, pointing addresses everywhere to infected hosts.
    4. It opened a user’s Internet Explorer browser to a site with the virus.
  7. Which of the following is FALSE about loopback addresses?
    1. They are assigned by the local ISP.
    2. They fall into the range 127.0.0.0/8.
    3. They are non-routable on the Internet.
    4. They are often used by services that must contact other services running on the same machine
  8. Network systems are located at different locations within our environment. Which of the following sections would be the best location for a web server that you want external customers to access?
    1. Semi-public
    2. Public
    3. Private
    4. Intranet
  9. Which of the following is the main problem with default passwords?
    1. They are difficult for valid users to guess.
    2. Frequently administrators do not know they are there and attackers do.
    3. They are usually hard to obtain.
    4. A default password can never be removed from a system.

Answers: D, A, B, C, C, B, B, A, B.

Entry requirements

Applicants without a tertiary qualification may be admitted to the Graduate Certificate in Cloud Computing and Virtualisation on the basis of professional attainment and/or work experience.

Upon successful completion of the Graduate Certificate, students will also be eligible for admission to the Master of Cloud Computing and Virtualisation.

Information on applying can be found on the How to Apply help page.

Master of Cloud Computing and Virtualisation

The Graduate Certificate in Cloud Computing and Virtualisation is designed in partnership with the Master of Cloud Computing and Virtualisation. The Graduate Certificate can be stand alone or, upon successful completion, students may proceed (with full credit) into the Master of Cloud Computing and Virtualisation.

Fees

Domestic Students
$3150 AUD per subject
International Students
$3250 AUD per subject

Students who complete a Graduate Certificate and then choose to proceed into the Master of Cloud Computing and Virtualisation attract a 10% alumni discount on their fees for their Masters enrolment.

More information on Fees can be found on the Fees page.

If you want to reduce your cost per course you may be eligible for credit.

Credit

Academic credit is available to students who can provide proof they have passed relevant industry certification examinations or who have completed previous study. No fees are charged for subjects students receive credit for.

Prospective students can obtain an estimate of credit entitlements from Industry Examinations by filling out the Credit Eligibility Form.

NOTE: The actual level of credit awarded will be confirmed upon acceptance into the Degree.

Find out more with a personalised assessment of your eligibility, or apply now!